Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure intra- and inter-domain handover

a secure intra- and inter-domain technology, applied in data switching networks, wireless commuication services, eavesdropping prevention circuits, etc., can solve the problems of not defining what context information should actually be, existing solutions that do not allow for a fast roaming, and the approach described in ieee 802.11i is certainly not suitable for fast roaming

Active Publication Date: 2011-09-27
NTT DOCOMO INC
View PDF22 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0020]Further, an important advantage of the present invention is that it is not restricted to handover within a single communication domain, also referred to as intra-domain handover, but may also be applied to handover between different communication domains, also referred to as inter-domain handover in the following.
[0021]Therefore, only the present invention allows for a fast and secure handover for an intra- / inter-domain handover scenario in mobile communication networks, where intelligence, i.e. handover control related functionality, is provided at the borderline between wireless and wireline bounded communication within the environment.
[0022]According to a preferred embodiment of the present invention, secure handover is executed between access devices of a same communication domain, i.e. as an intra-domain handover.
[0023]Here, it is proposed to have different security keys also referred to as authentication values in the following. A first such key is a master key which is generated during log-on of the mobile device at an authentication server. This master key or master secret authentication value is then passed to different access points.
[0024]Preferably, the different access points and the authentication server have a secure connection and log-in takes place on the basis of a mutual authentication between the mobile device and the related access point.
[0025]According to the present invention, it is proposed that the access device and the mobile device derive a communication key for communication between the access point and the mobile device and further a third, so-called roaming key.

Problems solved by technology

Today, problems arise, e.g., for intra-domain handover, i.e. a handover between access points and / or base stations of the same mobile communication environment.
In particular, existing solutions do not allow for a fast and at the same time authenticated handover between a first network access point and a second network access point in support of a fast, secure, and seamless handover.
Actually, this is a big problem for future generation mobile communications using distributed networks.
While this standard provides a solution for secure transfer of context information to a new access point, it does nevertheless not define what a context information should actually contain.
Further, the standard IEEE 802.11f does not define how mutual authentication should take place at the new access point.
Therefore, the approach described in IEEE 802.11i is certainly not suitable for fast roaming, in particular when there is a lot of traffic in the backbone network and the access server is located far away from the access point or equivalently hotspot.
However, what is not discussed is the issue of sending context information with different stakeholders and technologies spread out over different wireless communication networks.
Nevertheless, this protocol does not relate to distributed mobile communication environment and inter-domain handover and it does also not discuss issues related to re-authentication and mutual authentication during handover, in particular with respect to different stakeholders.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure intra- and inter-domain handover
  • Secure intra- and inter-domain handover
  • Secure intra- and inter-domain handover

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061]In the following, through reference to the enclosed drawing, the best mode and preferred embodiment of the present invention will be described. Insofar as related functionality is described with respect to structural diagrams or flowcharts, it should be noted that the person skilled in the art readily appreciates that any such type of functionality may be either implemented in software, in hardware, and / or using any combination thereof.

[0062]Further, insofar as reference is made to a mobile communication environment, the person skilled in the art will readily appreciate that there is not imposed any particular restriction of the type of mobile communication environment. Therefore, mobile communication environment in the sense of the present invention is to be understood in its broader sense, irrespective of the underlying technology, e.g., mobile communication telephony, mobile communication data services, wireless local area networks, wireless Internet access, wireless satell...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

To achieve a secure and fast handover in a distributed mobile communication environment (10), the control functionality is lying at the borderline between wireless and wire-bound communication network elements, and it is proposed to, firstly, execute a mutual authentication between a mobile device (26) and a new access point (14) using security context information previously transmitted to the new access point. Then, after successful mutual authentication, a handover will be executed from the current access point (12) to the new access point (14).

Description

[0001]Applicant hereby claims priority from PCT / EP2004 / 000562 filed on Jan. 23, 2004, PCT / EP2003 / 010183 filed on Sep. 12, 2003, PCT / EP2003 / 010184 filed on Sep. 12, 2003, and PCT / EP2003 / 010185 filed on Sep. 12, 2003, priority, which are hereby incorporated by reference in their entirety.[0002]The present invention relates to a method of handover in a distributed mobile communication environment, and in particular to a secure intra- and inter-domain handover for a distributed mobile communication environment.BACKGROUND ART[0003]Future generation mobile communication networks will have a control intelligence distributed to the edge between wireless and wireline infrastructure elements. Thus, distribution of intelligence to the edge of the mobile communication environment will be referred to as distributed mobile communication environment in the following. While in the following reference will be made to specific examples of such distributed mobile communication environments, it should ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04W36/00H04L12/28H04L12/56H04L29/06H04W8/18H04W12/06H04W28/18H04W36/08H04W36/14H04W36/30H04W36/32H04W48/18H04W84/12
CPCH04L63/0869H04W12/06H04W36/0066H04W28/18H04W36/0038H04W36/0061H04W36/30H04W36/32H04W48/18H04L63/205H04W8/18H04W84/12H04W12/062
Inventor PRASAD, ANAND R.
Owner NTT DOCOMO INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products